Cloud Security Masterclass: Minimizing the Blast Radius of a Cloud Breach

Logo
Presented by

Josh Stella, Co-Founder and CEO of Fugue

About this talk

The recent Twitch breach may have begun with a lone server misconfiguration, but its blast radius reached everything from sensitive customer data to source code for yet-to-be-released applications. Today’s cloud attacks don’t exploit a single misconfiguration, but rather a series of them. In this Cloud Security Masterclass, Josh Stella will walk through a process for understanding the blast radius of a variety of potential security events in your environment, and steps you can take to prevent minor ones from becoming catastrophic breaches. You’ll walk away from this session with an understanding of how to: Evaluate your Identity and Access Management (IAM) resources for weaknesses that attackers can exploit Employ penetration testing methodologies to assess the blast radius of public-facing resource misconfigurations Harden your cloud security posture using policy as code to address complex, multi-resource “blast radius” risks

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (23)
Subscribers (959)
Cloud computing has turned security on its head. The cloud attack surface is the configuration of thousands of interrelated resources — and it’s all changing constantly. Ensuring continuous cloud security and compliance requires a deep understanding how cloud works and the nature of misconfiguration. Why it happens, how hackers exploit it, and how to prevent it. At Fugue, we’re committed to helping cloud professionals master the concepts they need to ensure the security of their cloud infrastructure. Our Cloud Security Masterclass series is led by Fugue CTO and co-founder Josh Stella, who has extensive experience with cloud security and working with national security customers as a Principal Solutions Architect with AWS. He takes us on technical deep dives into critical cloud infrastructure security concepts. Fugue helps cloud teams transform how they do cloud security at every stage of the software development lifecycle — so they can move faster in the cloud without breaking the rules that put data at risk.